Author:
Ben-Or Michael,Goldreich Oded,Micali Silvio,Rivest Ronald L.
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Blum, M., “How to Exchange (Secret) Keys”, ACM Trans. on Comp. Sys., Vol. 1, No. 2, 1983, pp. 175–193. Also in the Proc. of the 15th ACM Symp. on Theory of Computation, 1983, pp. 440–447.
2. M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits”, SIAM Jour. on Computing, Vol. 13, Nov. 1984, pp 850–864 (Preliminary version: Proc. 23rd IEEE Symp. on Foundations of Computer Science, 1982, pp 112–117.)
3. Blum, M., and Rabin, M.O., “Mail Certification by Randomization”, in preparation.
4. Diffie, W., and Hellman, M.E., “New Directions in Cryptography”, IEEE Trans. on Inform. Theory, Vol. IT-22, No. 6, November 1976, pp. 644–654.
5. Even, S., “A Protocol for Signing Contracts”, TR No. 231, Computer Science Dept., Technion, Haifa, Israel, 1982. Presented in Crypto81.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献